Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp2909984ybg; Mon, 28 Oct 2019 04:30:14 -0700 (PDT) X-Google-Smtp-Source: APXvYqwtaQ97f1maw30hYVo3FLHaBCO5MUjfP5/8njggFWD/tTPp3wVTIuAYdeqn4sUtjYouioOa X-Received: by 2002:a05:6402:696:: with SMTP id f22mr7597496edy.104.1572262213955; Mon, 28 Oct 2019 04:30:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572262213; cv=none; d=google.com; s=arc-20160816; b=QGYqxWtyciNSw9ZrRPtkz6m1WZ/mn951eZZ9xanXgrv9byI+0I3w4SBhe5KenafX+Y b5BRXlVseiuNEDFSpHi11GZ/jnoRgmnrL/El50vgmasVEDfArkKyJyozo/rJ2Z8VpKKc +c6788S13pDBbTr5kkAGpskVpTxZNl8jx5HkmZnEBu3ksBwztTgKKhwWe9rhv+JYI0AK 3otq0znbZ6OE1kVT6w2lw4OjrH1VurxIJSvm+WrmGDVGrJB7kzCsuWlEzbobQskqVj/p L7k+hv76P6ulFstaDwaC4sYLa7egxrKGOyDapo42ut/oeFZKy9pe2a+t4e0Vicnz2qmt PV/w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=vsFL765c1KCV6K+nQ9a6XnqrgurDAf4fLdo7ONE1cZo=; b=mXVP1GzcOXk1G2PbEeOHJmX3argfiDmTisS8T1wfO88MkJdVNUehe+G2Wuw64sgzco RZfjkV6hduyxC7WQADs0v4O67oA9A/+/4Fw1siCqLnkbmrO5EE7HoLZfwiz17vDmm9pK E7mi0Ss7y4brVO4RRB7C+1f+xMUX0lk/eBFDek6AQOEiLqIN3kGkBhaHURcL3TfjvOjn m7beeH08/dVbj1QP1VGsTDLFiEjhtm3WFffvwR4yfVaehV+mUkM7TmEHmToRhMlV8nOx yK3R9m9Yo8JWF61ZH9R82CFvou1Wp6VgIbFSPsZBJbYtTB3t/tC38Q96iS3djK83XtOV Dhtw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2ffc1NjR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f6si7281592edb.431.2019.10.28.04.29.38; Mon, 28 Oct 2019 04:30:13 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2ffc1NjR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731592AbfJ0Vdk (ORCPT + 99 others); Sun, 27 Oct 2019 17:33:40 -0400 Received: from mail.kernel.org ([198.145.29.99]:59378 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727306AbfJ0VMd (ORCPT ); Sun, 27 Oct 2019 17:12:33 -0400 Received: from localhost (100.50.158.77.rev.sfr.net [77.158.50.100]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id DE453205C9; Sun, 27 Oct 2019 21:12:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1572210752; bh=gCYHcusNhWzJXqGWOeeOgWXiRT/up6syZSICKsJePtM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=2ffc1NjRzQSldFTzav48Nhc2gDNm/vWr1Lb02WCpMvTvJCCH5S56F/FPqMJQbmpbm stx13ilW1o/NTYUCVw8UWG1wF48Y3/Vgl5hirZdBciyFw4WcI6prhA6A7YayxOcv6F HDe/57+jRaWmBO+2rJIva9hqFZ9qVuA1quv8b2Ps= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, David Hildenbrand , Michal Hocko , Michal Hocko , Mike Kravetz , Anshuman Khandual , Andrew Morton , Linus Torvalds Subject: [PATCH 4.14 103/119] hugetlbfs: dont access uninitialized memmaps in pfn_range_valid_gigantic() Date: Sun, 27 Oct 2019 22:01:20 +0100 Message-Id: <20191027203349.118289051@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191027203259.948006506@linuxfoundation.org> References: <20191027203259.948006506@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: David Hildenbrand commit f231fe4235e22e18d847e05cbe705deaca56580a upstream. Uninitialized memmaps contain garbage and in the worst case trigger kernel BUGs, especially with CONFIG_PAGE_POISONING. They should not get touched. Let's make sure that we only consider online memory (managed by the buddy) that has initialized memmaps. ZONE_DEVICE is not applicable. page_zone() will call page_to_nid(), which will trigger VM_BUG_ON_PGFLAGS(PagePoisoned(page), page) with CONFIG_PAGE_POISONING and CONFIG_DEBUG_VM_PGFLAGS when called on uninitialized memmaps. This can be the case when an offline memory block (e.g., never onlined) is spanned by a zone. Note: As explained by Michal in [1], alloc_contig_range() will verify the range. So it boils down to the wrong access in this function. [1] http://lkml.kernel.org/r/20180423000943.GO17484@dhcp22.suse.cz Link: http://lkml.kernel.org/r/20191015120717.4858-1-david@redhat.com Fixes: f1dd2cd13c4b ("mm, memory_hotplug: do not associate hotadded memory to zones until online") [visible after d0dc12e86b319] Signed-off-by: David Hildenbrand Reported-by: Michal Hocko Acked-by: Michal Hocko Reviewed-by: Mike Kravetz Cc: Anshuman Khandual Cc: [4.13+] Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- mm/hugetlb.c | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) --- a/mm/hugetlb.c +++ b/mm/hugetlb.c @@ -1081,11 +1081,10 @@ static bool pfn_range_valid_gigantic(str struct page *page; for (i = start_pfn; i < end_pfn; i++) { - if (!pfn_valid(i)) + page = pfn_to_online_page(i); + if (!page) return false; - page = pfn_to_page(i); - if (page_zone(page) != z) return false;